ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆16Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for tep-attack-simulator
Users that are interested in tep-attack-simulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the Network Flow Generator for ICSSIM☆18Aug 28, 2025Updated 8 months ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆22Aug 31, 2023Updated 2 years ago
- jProxy 是一个 JAVA 编写的 HTTP 代理服 务器类库,支持 HTTP、HTTPS、Websocket 协议,并且支持 MITM(中间人攻击),可以对 HTTP、HTTPS 协议的报文进行捕获和篡改。☆10Aug 9, 2024Updated last year
- Code repository for the second edition of "Beginning Anomaly Detection Using Python-Based Deep Learning"☆24Jan 5, 2024Updated 2 years ago
- Apktool in Kali Linux, Termux, Ubuntu, Parrot OS maintained by EFX Tv☆20Jan 26, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 针对大模型的后门攻击☆12Jun 30, 2024Updated last year
- ☆14Dec 27, 2020Updated 5 years ago
- ☆13Aug 8, 2024Updated last year
- ☆14Oct 26, 2022Updated 3 years ago
- anomalies detection approach☆13Dec 23, 2024Updated last year
- Process-Aware Stealthy Attack Detection☆15Oct 17, 2018Updated 7 years ago
- ASR, End-to-End, end2end, Speech Recognition, 端到端语音识别☆12Oct 25, 2020Updated 5 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ReSonate: A framework for runtime risk assessment of autonomous cyber-physical systems☆11Jul 4, 2021Updated 4 years ago
- program course for haidian fellowship☆10Apr 15, 2021Updated 5 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- ☆10May 29, 2024Updated last year
- Extrae ip de numeros de telefono☆10Aug 28, 2023Updated 2 years ago
- Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".☆20Feb 26, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆11Aug 31, 2023Updated 2 years ago
- Documentación sobre sistemas embebidos☆13Nov 15, 2024Updated last year
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- Anomaly Detection Discriminative GAN (ADD-GAN)☆14Oct 9, 2017Updated 8 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- ☆30Dec 19, 2024Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆56May 1, 2024Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple C++ Reverse Shell☆12Nov 22, 2022Updated 3 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆19Jun 12, 2020Updated 5 years ago
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- ☆16May 9, 2022Updated 3 years ago
- A new metric for evaluating end-to-end speech recognition and disfluency removal systems☆19Mar 7, 2021Updated 5 years ago
- Official implementation of ECML PKDD'24 paper 'Self-Supervised Spatial-Temporal Normality Learning for Time Series Anomaly Detection'.☆18Aug 17, 2024Updated last year
- ☆11May 10, 2019Updated 6 years ago